From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <Anoob.Joseph@cavium.com>
Received: from NAM04-SN1-obe.outbound.protection.outlook.com
 (mail-eopbgr700054.outbound.protection.outlook.com [40.107.70.54])
 by dpdk.org (Postfix) with ESMTP id 8DDF11BA9E
 for <dev@dpdk.org>; Fri,  8 Jun 2018 18:49:19 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=BuiPkoHgxWU2bpvUeddVjebGsnJRwQHpOf+qTJHMIO8=;
 b=aGMKE0HCVx6tCetLjZt6JxiG7/cEaW8WseU6VsmOZepxKiAlWFISbadSmR3HcG07htknt2Hvc35lbbzSKqDwjX5cbjz28GQA2/NsGNGwjeLBCdvzQTr3W07YgdRKwvlxnujgcveHIDy0mI3jwdZjsasy83HEphJLQQo8KIKkTKM=
Authentication-Results: spf=none (sender IP is )
 smtp.mailfrom=Anoob.Joseph@cavium.com; 
Received: from ajoseph83.caveonetworks.com.caveonetworks.com (115.113.156.2)
 by SN6PR07MB4911.namprd07.prod.outlook.com (2603:10b6:805:3c::29) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.820.15; Fri, 8 Jun
 2018 16:49:14 +0000
From: Anoob Joseph <anoob.joseph@caviumnetworks.com>
To: Akhil Goyal <akhil.goyal@nxp.com>,
 Pablo de Lara <pablo.de.lara.guarch@intel.com>,
 Thomas Monjalon <thomas@monjalon.net>
Cc: Murthy NSSR <Nidadavolu.Murthy@cavium.com>,
 Ankur Dwivedi <ankur.dwivedi@cavium.com>,
 Jerin Jacob <jerin.jacob@caviumnetworks.com>,
 Narayana Prasad <narayanaprasad.athreya@caviumnetworks.com>,
 Nithin Dabilpuram <nithin.dabilpuram@cavium.com>,
 Ragothaman Jayaraman <Ragothaman.Jayaraman@cavium.com>,
 Srisivasubramanian Srinivasan <Srisivasubramanian.Srinivasan@cavium.com>,
 dev@dpdk.org
Date: Fri,  8 Jun 2018 22:15:18 +0530
Message-Id: <1528476325-15585-10-git-send-email-anoob.joseph@caviumnetworks.com>
X-Mailer: git-send-email 2.7.4
In-Reply-To: <1528476325-15585-1-git-send-email-anoob.joseph@caviumnetworks.com>
References: <1528476325-15585-1-git-send-email-anoob.joseph@caviumnetworks.com>
MIME-Version: 1.0
Content-Type: text/plain
X-Originating-IP: [115.113.156.2]
X-ClientProxiedBy: BM1PR01CA0071.INDPRD01.PROD.OUTLOOK.COM
 (2603:1096:b00:1::11) To SN6PR07MB4911.namprd07.prod.outlook.com
 (2603:10b6:805:3c::29)
X-MS-PublicTrafficType: Email
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0;
 RULEID:(7020095)(4652020)(5600026)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);
 SRVR:SN6PR07MB4911; 
X-Microsoft-Exchange-Diagnostics: 1; SN6PR07MB4911;
 3:mgUwWDTKYAHeaUiKjre7huSnMQuUpswuXeqhyuT4BZbXq8OLjg28UcoeAfwV0QB8wvfdmay5qpOTqm15NzdOcJdRVg6V/NbO83jhtdpKcJP/+MeoeuEfOPI1UlbnThDqj1RuEMhWYfRsAAxWrZIog2y9k9VvttYU02eNJHLzMTxeKLWH9z/PxDG9mFz5eTOzsKUVzmAb1WiPHtpY6vNpE6JmiROh140S75fMq/8W4cVKNFOrSBicPZCUG74Nsn1h;
 25:vRJ76WFU7JI36qL0bCjYmY5ZR9tqwL4ZsRElUD1Ojpi+yUL7oEohyKpUUP/7NSGfgtYFI/YjtFk7GL82gRy30po2cv3Hp0Br5pPlNuvbz/JLitmvHhIv1qWJeYx2QuigrrRI/5lZEJLkTLrxgsrn454wDAs95v1902TB+kxJBCDkSqRgYNBg0RCVfqJ19wgVCogCypI3sCZlduDbcA7l0SEUE+oyTsfYdCZlEaT+Xn6PONuHRK0XhVxm6fjIg12jTtbQ5L+HJGCxXLNMaRVbdqxp8kiGGhappFRQeFZSRtUEoFFJ8MS2wdFwVx+Z2CkV3sMV3Xg7B0FAEqtj5hxBdQ==;
 31:Ff2jc83xtiulrb+ZSuJV43IAf5Cr9JMTLbgczArbB3V8c+I1WmJxyCDU92KOFh1sI22XX/Qpbv9NEq4M882gfnSnjFN/wWxrwiIo+PCC095mqWQ0WVoCSRcAJ5oH5cimrQFVFYi7B00J1cmYk+lStt4AyOhyfojxpwh46RkveNV5ZZGGXjJLjCwlp/W9vE/1YsajOHl5ELYSKvBTJOqeAgHek5JmEeKOppfj1XJB9CE=
X-MS-TrafficTypeDiagnostic: SN6PR07MB4911:
X-Microsoft-Exchange-Diagnostics: 1; SN6PR07MB4911;
 20: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;
 4:v3rqwxOESPgSknMnBlAtL19X7AqGtXGUS/8l5Xqd+gFpY1Zx+0DveMULgSEbSFqQOYDd8R4pRNlD1bAVaUC0OnQNMhieSFisupIATwaXA4uJaLjQC9Xi2FgoFmP//EJK1W8YbDhv2na8d7VkV69Og7XHz/Mhcv7JXVhQAy+PGX6+dHFu6RvuGwoQ1kd3Nm7v4unjYmapL3na6xPHGh/sN0PGKaWjoCbHo5DKJ3v0tjZEwU5kJZ9wiZsMkR9adjFa2dWj7ojS/X0Rxiv4v50WHA==
X-Microsoft-Antispam-PRVS: <SN6PR07MB491180154A41F3CD9F65469BF87B0@SN6PR07MB4911.namprd07.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:;
X-MS-Exchange-SenderADCheck: 1
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0;
 RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(93006095)(3002001)(3231254)(944501410)(52105095)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(20161123564045)(6072148)(201708071742011)(7699016);
 SRVR:SN6PR07MB4911; BCL:0; PCL:0; RULEID:; SRVR:SN6PR07MB4911; 
X-Forefront-PRVS: 06973FFAD3
X-Forefront-Antispam-Report: SFV:NSPM;
 SFS:(10009020)(376002)(396003)(346002)(39380400002)(366004)(39860400002)(189003)(199004)(26005)(52116002)(956004)(305945005)(8676002)(81156014)(50226002)(8936002)(81166006)(7736002)(68736007)(105586002)(106356001)(3846002)(6116002)(72206003)(478600001)(6486002)(97736004)(6506007)(16586007)(6512007)(53936002)(47776003)(486006)(25786009)(5660300001)(50466002)(48376002)(4326008)(54906003)(76176011)(36756003)(110136005)(66066001)(8656006)(2906002)(316002)(55236004)(11346002)(16526019)(386003)(186003)(59450400001)(446003)(476003)(42882007)(44832011)(2616005)(51416003);
 DIR:OUT; SFP:1101; SCL:1; SRVR:SN6PR07MB4911;
 H:ajoseph83.caveonetworks.com.caveonetworks.com; FPR:; SPF:None; LANG:en;
 PTR:InfoNoRecords; MX:1; A:1; 
Received-SPF: None (protection.outlook.com: cavium.com does not designate
 permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN6PR07MB4911;
 23:ymO1WAnxc+e3xSl6HM+KeQUZpILN2JYQLt3JYAcV0?=
 =?us-ascii?Q?1d+SYlgmHH5g3WHUadwT2A1hk5k//yxqo1aGAinVpGlbDwhWzr+fD71pu4Fv?=
 =?us-ascii?Q?0WMVJZzcnMU4RUxb09CCi0d7Ew+wB60IQrUimrMUnRn60L8WdB+Uyy6uVSdf?=
 =?us-ascii?Q?Pl2dolxzMCl+9Z70RZL8j/3Njk0LNNCujUyRbk3fSw9jyJOubPNEwNmiBbOF?=
 =?us-ascii?Q?mT2CI86IZBvOwvNUF+v+/J0bWzzcfN6Xv9XeUENplvNi8qsDxui5ZJ4Bt86d?=
 =?us-ascii?Q?4eafpkE12uOELWip0tDyRVg6Tglg2jcVvjZHVv17IM0dZ/1P3P/6pA3QNfgV?=
 =?us-ascii?Q?DOJiAHv+HSucSonAp/+/bug0jBBK5KB2X3HeL77rxfOXLWEgoPTvY05/t8uw?=
 =?us-ascii?Q?GE4WifCwLtG6sOjdF46awtkPwIauZZsFTjuXzYo0cCYEUwxEthmJUqh+zuqb?=
 =?us-ascii?Q?u+mvvrzymuViWEXRg0txgv8yZDNzwn6eqTovj6/DtDvqkjC2L7TtyWwFMHfc?=
 =?us-ascii?Q?Qj9H5EC1P7VwzMrlFemvipQKj1cpk6yMH+tO/DlFgZqXgnHwfaduvnN/8guJ?=
 =?us-ascii?Q?cSZzSs+pR7MpV5eSkGWcpgTA5B/bQhR5Q9MxN6tM/YAkG6eLnsdhW787BqvS?=
 =?us-ascii?Q?+M/k9HwCiTdxtRCBvhxsg7Kw4lcko0dxb7JVzbfbN6Oi3q15cOleNV8FQ12F?=
 =?us-ascii?Q?5Wojb/o3EreJ9cO2b/Cco5ng/lutg1lPA1nLGvU12pNfvEsRjmwkHcPcqVAt?=
 =?us-ascii?Q?QCURKp/GX31CNc0amtjBhOoypPQ21NuZectXCFxniQf87ROAgXNCBUHzxb4c?=
 =?us-ascii?Q?qzNhhAAhEdWoh538HDpHT8xdzDdUELrj2aXfOsE8I6uaAmvHEh6XpYFhn6kF?=
 =?us-ascii?Q?R8Xb5h8uNYclEHmLycWSv3kfjWgLZpjO36JaH0K34NIUjzZQrwi3xsAh+Drr?=
 =?us-ascii?Q?zxDySR3n4ZFplP2tLYTTtd2wQEx3rJT6bwE4qLzXnc8iMrW2U3V7LmO0x/JJ?=
 =?us-ascii?Q?EHzgIdbWfnasrGmANc1kwFb3zVv74N3yYLsenc+ztHxA0rx+e9dvmCqURGL2?=
 =?us-ascii?Q?5Xpsbq7WxlXmWVLiPb0uwh5aJGG8t/kHpflpYNBmxw8i7IdI5wmtxe3HvHUH?=
 =?us-ascii?Q?nkTRZ30cPQhnZV3PVDlESPLaLTMxlpquz76Ut3Zomge0r1WMfgvCk4/6fotp?=
 =?us-ascii?Q?aBX7yJ2fA6zFaQoUgwdCDWb/ZLJY5BHNpYnwOf/BLa04qTEVD9AB429FS9Uf?=
 =?us-ascii?Q?kZJMTBggXKQsXbKajZBtTN5qETRaohuX3ToFFf8jwt68SiRzcFj9B6noMk9J?=
 =?us-ascii?B?Zz09?=
X-Microsoft-Antispam-Message-Info: OBihZspdEnF73PweL63b5K7nG66NYOltztZgi20B9SeHpo19uxy6VHcmLasnlB4y35HUVagdaU66RYPa1U2tAPiceMz8/XI+zx4zxWvd4ZIcba2DIX5jXprUr+gfv4m62I/U5ALzRWZEAIZKTAaXNRN5owg99SGCWEJFVgsNkvcxqXRKQfxaxOtSVRUUyX3f
X-Microsoft-Exchange-Diagnostics: 1; SN6PR07MB4911;
 6:ewyCqiJa610ZoBmJQ9osY/2kXml8Ec6NNffhsbKX8r4F0zb9EbCli0ZeBB00FIob85/t6/XKOY7RDvJtG8DJByjnZKWCyYYooveDkOjTwlF1kKk67ecjh3CIlaIBTZ00I5hxodewQZnLZ3FqMENZN5bc9ksG8hhka8DKvSfzmtNlvtrAfPNZA4H4MhvZMKbdkbavFmE/neZbpUPlnXWGf2KYUFRr0xDwciByDJ9Ognuel8lu7H+6cXNRrtj0mroHCo1gvQJltLFcGZf+LRFzov5H00xijPs4ckwGZIKfftFccNlvXV3yQmsvkR97G7X3gYpK+MDizh5SbIKFrsmRIW3CNXOapYt99vNtU1IHuK/2H8FXb4Yw09XombTHXHJrVRYDRzmer/d3Za6x/c+lpHeyYUc+WjdjSNqzDr6hkKXsFiU9hBGi4xbi4+MkFv25LkUxpC35K7VCYwVr42Efsg==;
 5:fSrG4idRikPs+jx8qqklD1jPImAkB2/OlE45D9QHvYbwOd8pZPj7A2tEC3+LssawFM5Si0eL9wE4GJpU0yH7yqGxdAbKIbPFetMZcdgXJpaG9CfsBc53xxuahyJ5N3r+jMYnVhLYOHRud+tsFU6MHKi/SvNPlrQPO1Cxm1keCBk=;
 24:Lt+2iP2/HxC4b1QqHOdLo8IzjwPAsHV09I545wj/QhK56DYeKSZydLMfemvKIB7Q6qoB9ot6qQHyHiWUV0MeUvnLaeg+YkeEyAJdhf+E4R4=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; SN6PR07MB4911;
 7:m64Z3DykKwgKMxheVR/ZvCisxExfczBqAcs1TH31CvDsU9dGnfSAWEBthLdXSGB8pFALJKJOhL/RBm7bA03LQVPkGt5PpjTu7i4c72HpdNBErSFTV/xMjU4i8aC64CqBD6uJNsWy7YMtl6gM7PgkZnxImfJAcxBjCpIoeYW18xiAjJNcax9axiKUmZUwb2N14r9+Qw37lnmMhm4MCU6LOHVmgyCqPZr0DUruw+wNj7HnOKttM/vReoWPvAh5G0hn
X-MS-Office365-Filtering-Correlation-Id: b6238039-9629-4ac9-14a6-08d5cd5fc672
X-OriginatorOrg: caviumnetworks.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Jun 2018 16:49:14.2437 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: b6238039-9629-4ac9-14a6-08d5cd5fc672
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 711e4ccf-2e9b-4bcf-a551-4094005b6194
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR07MB4911
Subject: [dpdk-dev] [PATCH 09/16] crypto/cpt/base: add prepare request API
	for HASH and HMAC
X-BeenThere: dev@dpdk.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DPDK patches and discussions <dev.dpdk.org>
List-Unsubscribe: <https://dpdk.org/ml/options/dev>,
 <mailto:dev-request@dpdk.org?subject=unsubscribe>
List-Archive: <http://dpdk.org/ml/archives/dev/>
List-Post: <mailto:dev@dpdk.org>
List-Help: <mailto:dev-request@dpdk.org?subject=help>
List-Subscribe: <https://dpdk.org/ml/listinfo/dev>,
 <mailto:dev-request@dpdk.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jun 2018 16:49:20 -0000

From: Murthy NSSR <Nidadavolu.Murthy@cavium.com>

These functions help in preparing symmetric crypto requests
for HMAC only or HMAC only cases.

Signed-off-by: Ankur Dwivedi <ankur.dwivedi@cavium.com>
Signed-off-by: Murthy NSSR <Nidadavolu.Murthy@cavium.com>
Signed-off-by: Nithin Dabilpuram <nithin.dabilpuram@cavium.com>
Signed-off-by: Ragothaman Jayaraman <Ragothaman.Jayaraman@cavium.com>
Signed-off-by: Srisivasubramanian Srinivasan <Srisivasubramanian.Srinivasan@cavium.com>
---
 drivers/crypto/cpt/base/cpt_ops.c | 215 ++++++++++++++++++++++++++++++++++++++
 1 file changed, 215 insertions(+)

diff --git a/drivers/crypto/cpt/base/cpt_ops.c b/drivers/crypto/cpt/base/cpt_ops.c
index 15c3413..eb25607 100644
--- a/drivers/crypto/cpt/base/cpt_ops.c
+++ b/drivers/crypto/cpt/base/cpt_ops.c
@@ -450,6 +450,218 @@ int32_t cpt_fc_get_ctx_len(void)
 	return (uint32_t)i;
 }
 
+static int
+cpt_digest_gen_prep(uint32_t flags,
+		    uint64_t d_offs,
+		    uint64_t d_lens,
+		    digest_params_t *params,
+		    void *op,
+		    void **prep_req)
+{
+	cpt_request_info_t *req;
+	uint32_t size, i;
+	int32_t m_size;
+	uint16_t data_len, mac_len, key_len;
+	auth_type_t hash_type;
+	buf_ptr_t *meta_p;
+	struct cpt_ctx *ctx;
+	sg_comp_t *gather_comp;
+	sg_comp_t *scatter_comp;
+	uint8_t *in_buffer;
+	uint32_t g_size_bytes, s_size_bytes;
+	uint64_t dptr_dma, rptr_dma;
+	vq_cmd_word0_t vq_cmd_w0;
+	vq_cmd_word3_t vq_cmd_w3;
+	void *c_vaddr, *m_vaddr;
+	uint64_t c_dma, m_dma;
+	opcode_info_t opcode;
+
+	if (!params || !params->ctx_buf.vaddr)
+		return ERR_BAD_INPUT_ARG;
+
+	(void)d_offs;
+	ctx = params->ctx_buf.vaddr;
+	meta_p = &params->meta_buf;
+
+	if (!meta_p->vaddr || !meta_p->dma_addr)
+		return ERR_BAD_INPUT_ARG;
+
+	if (meta_p->size < sizeof(cpt_request_info_t))
+		return ERR_BAD_INPUT_ARG;
+
+	m_vaddr = meta_p->vaddr;
+	m_dma = meta_p->dma_addr;
+	m_size = meta_p->size;
+
+	/*
+	 * Save initial space that followed app data for completion code &
+	 * alternate completion code to fall in same cache line as app data
+	 */
+	m_vaddr = (uint8_t *)m_vaddr + COMPLETION_CODE_SIZE;
+	m_dma += COMPLETION_CODE_SIZE;
+	size = (uint8_t *)RTE_PTR_ALIGN((uint8_t *)m_vaddr, 16) -
+		(uint8_t *)m_vaddr;
+	c_vaddr = (uint8_t *)m_vaddr + size;
+	c_dma = m_dma + size;
+	size += sizeof(cpt_res_s_t);
+
+	m_vaddr = (uint8_t *)m_vaddr + size;
+	m_dma += size;
+	m_size -= size;
+
+	req = m_vaddr;
+
+	size = sizeof(cpt_request_info_t);
+	m_vaddr = (uint8_t *)m_vaddr + size;
+	m_dma += size;
+	m_size -= size;
+
+	/* Initialising ctrl and opcode fields */
+
+	req->dma_mode = CTRL_DMA_MODE_SGIO;
+	req->se_req = SE_CORE_REQ;
+
+	hash_type = ctx->hash_type;
+	mac_len = ctx->mac_len;
+	key_len = ctx->auth_key_len;
+	data_len = AUTH_DLEN(d_lens);
+
+	/*GP op header */
+	vq_cmd_w0.u64 = 0;
+	vq_cmd_w0.s.param2 = htobe16(((uint16_t)hash_type << 8));
+	if (ctx->hmac) {
+		opcode.s.major = MAJOR_OP_HMAC | DMA_MODE;
+		vq_cmd_w0.s.param1 = htobe16(key_len);
+		vq_cmd_w0.s.dlen = htobe16((data_len + ROUNDUP8(key_len)));
+	} else {
+		opcode.s.major = MAJOR_OP_HASH | DMA_MODE;
+		vq_cmd_w0.s.param1 = 0;
+		vq_cmd_w0.s.dlen = htobe16(data_len);
+	}
+
+	opcode.s.minor = 0;
+
+	vq_cmd_w0.s.opcode = htobe16(opcode.flags);
+
+	/* DPTR has SG list */
+	in_buffer = m_vaddr;
+	dptr_dma = m_dma;
+
+	((uint16_t *)in_buffer)[0] = 0;
+	((uint16_t *)in_buffer)[1] = 0;
+
+	/* TODO Add error check if space will be sufficient */
+	gather_comp = (sg_comp_t *)((uint8_t *)m_vaddr + 8);
+
+	/*
+	 * Input gather list
+	 */
+
+	i = 0;
+
+	if (ctx->hmac) {
+		uint64_t k_dma = params->ctx_buf.dma_addr +
+			offsetof(struct cpt_ctx, auth_key);
+		/* Key */
+		i = fill_sg_comp(gather_comp, i, k_dma,
+				 ctx->auth_key, ROUNDUP8(key_len));
+	}
+
+	/* input data */
+	size = data_len;
+	if (size) {
+		i = fill_sg_comp_from_iov(gather_comp, i, params->src_iov,
+					  0, &size, NULL, 0);
+		if (size) {
+			PMD_TX_LOG(DEBUG, "Insufficient dst IOV size, short by"
+				   " %dB\n", size);
+			return ERR_BAD_INPUT_ARG;
+		}
+	} else {
+		/*
+		 * Looks like we need to support zero data
+		 * gather ptr in case of hash & hmac
+		 */
+		i++;
+	}
+	((uint16_t *)in_buffer)[2] = htobe16(i);
+	g_size_bytes = ((i + 3) / 4) * sizeof(sg_comp_t);
+
+
+	/*
+	 * Output Gather list
+	 */
+
+	i = 0;
+	scatter_comp =
+		(sg_comp_t *)((uint8_t *)gather_comp + g_size_bytes);
+
+	if (flags & VALID_MAC_BUF) {
+		if (params->mac_buf.size < mac_len)
+			return ERR_BAD_INPUT_ARG;
+
+		size = mac_len;
+		i = fill_sg_comp_from_buf_min(scatter_comp, i,
+					      &params->mac_buf, &size);
+	} else {
+		size = mac_len;
+		i = fill_sg_comp_from_iov(scatter_comp, i,
+					  params->src_iov, data_len,
+					  &size, NULL, 0);
+		if (size) {
+			PMD_TX_LOG(DEBUG, "Insufficient dst IOV size, short by"
+				   " %dB\n", size);
+			return ERR_BAD_INPUT_ARG;
+		}
+	}
+
+	((uint16_t *)in_buffer)[3] = htobe16(i);
+	s_size_bytes = ((i + 3) / 4) * sizeof(sg_comp_t);
+
+	size = g_size_bytes + s_size_bytes + SG_LIST_HDR_SIZE;
+
+	/* This is DPTR len incase of SG mode */
+	vq_cmd_w0.s.dlen = htobe16(size);
+
+	m_vaddr = (uint8_t *)m_vaddr + size;
+	m_dma += size;
+	m_size -= size;
+
+	/* cpt alternate completion address saved earlier */
+	req->alternate_caddr = (uint64_t *)((uint8_t *)c_vaddr - 8);
+	*req->alternate_caddr = ~((uint64_t)COMPLETION_CODE_INIT);
+	rptr_dma = c_dma - 8;
+
+	req->ist.ei1 = dptr_dma;
+	req->ist.ei2 = rptr_dma;
+	/* First 16-bit swap then 64-bit swap */
+	/* TODO: HACK: Reverse the vq_cmd and cpt_req bit field definitions
+	 * to eliminate all the swapping
+	 */
+	vq_cmd_w0.u64 = htobe64(vq_cmd_w0.u64);
+
+	/* vq command w3 */
+	vq_cmd_w3.u64 = 0;
+
+	/* 16 byte aligned cpt res address */
+	req->completion_addr = (uint64_t *)((uint8_t *)c_vaddr);
+	*req->completion_addr = COMPLETION_CODE_INIT;
+	req->comp_baddr  = c_dma;
+
+	/* Fill microcode part of instruction */
+	req->ist.ei0 = vq_cmd_w0.u64;
+	req->ist.ei3 = vq_cmd_w3.u64;
+
+	req->op = op;
+
+#ifdef CPTVF_STRICT_PARAM_CHECK
+	if (!(m_size >= 0))
+		abort();
+#endif
+	*prep_req = req;
+	return 0;
+}
+
 static inline int  __attribute__((always_inline))
 cpt_enc_hmac_prep(uint32_t flags,
 		  uint64_t d_offs,
@@ -2531,6 +2743,9 @@ static inline int  __attribute__((always_inline))
 	} else if (fc_type == KASUMI) {
 		ret = cpt_kasumi_enc_prep(flags, d_offs, d_lens,
 					  fc_params, op, &prep_req);
+	} else if (fc_type == HASH_HMAC) {
+		ret = cpt_digest_gen_prep(flags, d_offs, d_lens,
+					  fc_params, op, &prep_req);
 	} else {
 		ret = ERR_EIO;
 	}
-- 
1.9.3